Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIA Topic 7 Question 52 Discussion

Actual exam question for GIAC's GCIA exam
Question #: 52
Topic #: 7
[All GCIA Questions]

Which of the following techniques is used to identify attacks originating from a botnet?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Cyril
2 months ago
Ah, the age-old battle against those sneaky botnets. I say we just unleash a swarm of cyberbees to sting them into submission. Or maybe we could try D) Recipient Filtering - it's like putting your inbox on a strict diet, no junk mail allowed!
upvoted 0 times
Tu
27 days ago
Let's not forget about BPF-based filter, it could be a powerful tool in our fight against botnets.
upvoted 0 times
...
Vi
1 months ago
I think passive OS fingerprinting could also help us identify those sneaky attacks.
upvoted 0 times
...
Britt
1 months ago
Recipient filtering sounds like a good idea, we need to keep those botnets out!
upvoted 0 times
...
...
Thea
2 months ago
Hold up, I got a better idea - why not use A) IFilter? It's like a magic wand that can just wave away all those pesky botnet attacks. Seriously though, I think B) is the way to go.
upvoted 0 times
Macy
7 days ago
I'm not sure, but D) Recipient filtering could also work.
upvoted 0 times
...
Howard
8 days ago
But what about C) Passive OS fingerprinting?
upvoted 0 times
...
Crista
21 days ago
I agree, B) BPF-based filter is more effective.
upvoted 0 times
...
Candra
1 months ago
I think A) IFilter is a good choice.
upvoted 0 times
...
...
Brendan
2 months ago
I'm going to go with D) Recipient filtering. It's a common method for blocking botnet traffic by analyzing the target addresses of suspicious network activity.
upvoted 0 times
Paris
1 months ago
I think BPF-based filter could also be effective in identifying attacks from a botnet. It allows for more granular control over network traffic.
upvoted 0 times
...
Sena
2 months ago
Recipient filtering is a good choice. It helps block botnet traffic by checking the target addresses.
upvoted 0 times
...
...
Rozella
2 months ago
Hmm, I'm not sure about this one. Could it be C) Passive OS fingerprinting? That seems like a good way to detect botnets based on the infected devices' operating systems.
upvoted 0 times
...
Isabella
2 months ago
I'm not sure, but I think B) BPF-based filter could also be used to identify botnet attacks.
upvoted 0 times
...
Tegan
2 months ago
I agree with Nguyet, Passive OS fingerprinting can help identify botnet attacks.
upvoted 0 times
...
Elden
2 months ago
I think the answer is B) BPF-based filter. It's a powerful technique for identifying botnet attacks by analyzing network traffic patterns.
upvoted 0 times
Myra
24 days ago
Recipient filtering is more commonly used to prevent spam emails, not to identify botnet attacks.
upvoted 0 times
...
Valentine
1 months ago
Passive OS fingerprinting can also be used to identify attacks originating from a botnet.
upvoted 0 times
...
Helga
1 months ago
I agree, BPF-based filter is a commonly used technique to detect botnet attacks.
upvoted 0 times
...
Alline
2 months ago
I think the answer is B) BPF-based filter. It's a powerful technique for identifying botnet attacks by analyzing network traffic patterns.
upvoted 0 times
...
...
Nguyet
3 months ago
I think the answer is C) Passive OS fingerprinting.
upvoted 0 times
...

Save Cancel